Imagine walking past a 12-foot-tall scroll covered in seemingly nonsensical letters every day for 30 years and wondering just what the hell it actually means. That's probably how it feels to be the Central Intelligence Agency (CIA) employees who regularly pass by the infamous Kryptos sculpture in the courtyard of the bureau's headquarters in Langley, Virginia.
Kryptos, devised by artist Jim Sanborn, has been around for nearly three decades, and yet no one has figured out what the full message says, let alone cracked the underlying riddle. Even the National Security Agency (NSA) could only decrypt part of the code.
Now, just months before a dedication ceremony in November to celebrate the copper scroll's 30 years of stumping experts, Sanborn has released a third and final clue to help hobbyistswho easily number in the thousands, based on activity in code-cracking forumsfigure out what the remaining, unsolved 97-character passage says.
But Sanborn says unscrambling that phrase won't exactly lead you to a quick victory. It's really just the end of step one.
"It's a 97-character phrase," he told NPR. "And that phrase is in itself a riddle. It's mysterious. It's going to lead to something else. It's not going to be finished when it's decoded.
As for the clue itself? It's one word: NORTHEAST.
In 1990, sculptors first erected Kryptos. At about 12 feet tall and 20 feet long, the now-greenish copper structure offers up some 240 square feet of frustration to all of the CIA employees and codebreakerslike video game developer and cryptologist Elonka Duninwho set eyes on it.
Dunin is a master cryptographer and runs a helpful and in-depth website all about Kryptos. (She's cracked so many codes that Dan Brown, author of The Da Vinci Code, even named a character in that book after her.) According to her site, Kryptos contains a series of punched-out letters in a metal structure, is made up of thousands of characters, and shows four total messages.
There are actually several various parts to Kryptos, all scattered around the CIA headquarters. There's the ultra-famous copper scroll, which contains nearly 1,800 encrypted characters. It's next to a petrified tree and a circular pool. Then there are several sheets of copper, embossed with Morse Code, and sandwiched between granite slabs. A nearby landscaped area includes more granite slabs and a duck pond. Finally, there's an engraved compass with a needle pointing at a lodestone, a naturally magnetized form of magnetite rock.
Sanborn received a bit of help from Edward Scheidt, a retired chairman of the CIA's cryptographic center, to come up with the codes for each passage. The Kryptos message contains a partial guide to the code's solution inside the panels of the sculpture.
Thanks to two prior clues from Sanborn in 2010 and 2014, the first three passages have been solved by the likes of NSA employees and James Gillogly, a computer scientist, but the final 97-character portion still eludes experts.
"It is considered to be one of the most famous unsolved codes of the world," Dunin said in a documentary interview. "Here we are going on 30 years, and it still hasn't been cracked."
University of California San Diego
The first portion of the Kryptos puzzle is a poetic phrase, written by Sanborn, himself:
Sanborn says that the misspelling of "illusion" as "iqlusion" was intentional, to make it tougher for cryptographers to decode.
In the second phrase, the exact latitude and longitude of the CIA headquarters is pointed out, and something buried is hinted at:
Apparently "W.W." is a reference to William Webster, who headed the CIA when the sculpture was first unveiled in 1990. Sanborn allegedly gave him a key to decipher the code.
In the third section, there are lines from archaeologist Howard Carter's diary, describing a door opening into King Tut's tomb. Note that there are more misspellings:
Karl Wang, a student at the University of California San Diego who created a page with the solutions, says the third passage is much more difficult to crack than the prior two.
"The first two parts are straight-forward enough that nearly anybody with a simple education in cryptography can solve them," he said on his page. "The third part is much more advanced, and the fourth part is borderline impossible."
Gillogly was the first to publicly announce a solution for the first three parts, which he completed with a computer attack in 1999, according to Dunin's website. Afterward, the CIA said its own analyst, David Stein, had also solved those first three parts, but had done so a year prior with paper and pencil.
Two years after Stein's solution was announced, the NSA claimed it had a team that solved parts one through three all the way back in 1992, but kept mum. Still, no one has cracked part four.
To solve the first two passages, codebreakers used vigenere, which is what cryptologists call a polyalphabetic substitution cipher system. It means multiple alphabets are used to encrypt one message. Created in the 16th century by cryptographer Giovan Battista Bellaso, the scheme was easy to create, but excruciatingly hard to crack. It wasn't until nearly 300 years later that a vigenere cipher was first solved, leading the French to call it "le chiffre indchiffrable," or "the indecipherable cipher." Today, people mostly use computers to crack these codes.
To solve part four, Dunin and other cryptologists have tried every method at their disposal, from polyalphabetic substitution to transposition. No such luck. Now, with three clues in hand, "BERLIN," CLOCK," and "NORTHEAST," it's your turn.
Here are the materials you should peruse to get ahead in solving the final Kryptos cipher:
Unsolved!
When you think you have the answer right, head to Sanborn's website, where you can find the best way to contact him to see if your solution is correct. Right now, it's an email process that costs $50 per entry.
If all else fails, don't get too hard on yourself. "Kryptos" is Greek for "hidden," and it looks like the answers to this puzzle might well be tucked away for another 30 yearsor at least until Sanborn dies and eventually auctions off the solution to the code. He told The New York Times that any of the money raised through an auction will go to climate science.
Continue reading here:
Nobody Has Solved This Cryptographic Puzzle for 30 Years. Think You Can? - Popular Mechanics
- To Foil NSA Spies, Encrypt Everything [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- What is cryptography? - A Word Definition From the ... [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- cryptography: Definition from Answers.com [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Cryptography - Wikipedia, the free encyclopedia [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Cryptography - CISSP Domain 07 - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Cryptography Advanced Encryption Standard AES Tutorial,fips 197 - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Faraday Project for Network Security and Cryptography - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- An Overview of Cryptography - Gary C. Kessler [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- An Open Letter from US Researchers in Cryptography and ... [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Gambling with Secrets Part 4 8 Private Key Cryptography - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Gambling with Secrets Part 1 8 What is Cryptography - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Public Key Cryptography RSA Encryption Algorithm - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Public Key Cryptography Diffie Hellman Key Exchange - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Intro to Cryptography - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Caesar Cipher Ancient Cryptography - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- 50 top US cyber security experts write open letter calling for end to NSA 'snoop-ops' [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- Prominent cryptography and security researchers deplore NSA's surveillance activities [Last Updated On: January 27th, 2014] [Originally Added On: January 27th, 2014]
- Obama Stays Silent on Reform of NSA's Crypto Subversion [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Cryptography experts sign open letter against NSA surveillance [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- US crypto researchers to NSA: If you must track, track responsibly [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Java Cryptography Architecture (JCA) Overview - Video [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Cryptography - Part 1 - Video [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Cryptography - Part 2 - Video [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- International Journal on Cryptography and Information Security ( IJCIS) - Video [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Bitcoin Lowdown: Block Chain Cryptography Trumps Human Trust, Deal With It - Video [Last Updated On: January 31st, 2014] [Originally Added On: January 31st, 2014]
- Bitcoin Lowdown: Block Chain Cryptography Trumps Human Trust - Video [Last Updated On: January 31st, 2014] [Originally Added On: January 31st, 2014]
- NSA and GCHQ spoofed LinkedIn to hack Belgian cryptography professor [Last Updated On: February 1st, 2014] [Originally Added On: February 1st, 2014]
- Lecture 17: Elliptic Curve Cryptography (ECC) - Video [Last Updated On: February 1st, 2014] [Originally Added On: February 1st, 2014]
- Cryptography event - Pravega 2014 - Video [Last Updated On: February 3rd, 2014] [Originally Added On: February 3rd, 2014]
- Lecture 1: Introduction to Cryptography - Video [Last Updated On: February 3rd, 2014] [Originally Added On: February 3rd, 2014]
- US and UK spy agencies accused of swoop on Belgian cryptography expert [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- Conceal: Facebook's new Java APIs for cryptography on Android [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- Cryptography Apps: How To Keep Your Personal Info Private [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- Cryptography Breakthrough Could Make Software Unhackable [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- Oi, Android devs! Facebook wants your apps to be more secure [Last Updated On: February 5th, 2014] [Originally Added On: February 5th, 2014]
- Lecture 19: Elgamal Digital Signature - Video [Last Updated On: February 5th, 2014] [Originally Added On: February 5th, 2014]
- Lecture 18: Digital Signatures and Security Services - Video [Last Updated On: February 5th, 2014] [Originally Added On: February 5th, 2014]
- Cryptography 1. List some of the attacks on the Diffie ... [Last Updated On: February 6th, 2014] [Originally Added On: February 6th, 2014]
- Cryptography Breakthrough Could Make Software Unhackable ... [Last Updated On: February 6th, 2014] [Originally Added On: February 6th, 2014]
- Cryptography: Secret Coding, Spying, and E-Commerce - Video [Last Updated On: February 6th, 2014] [Originally Added On: February 6th, 2014]
- Cryptography - Video [Last Updated On: February 9th, 2014] [Originally Added On: February 9th, 2014]
- Public Key Cryptography: RSA Encryption Algorithm - Video [Last Updated On: February 10th, 2014] [Originally Added On: February 10th, 2014]
- Is Bitcoin Anonymous? Arvind Narayanan | Princeton University | Real World Cryptography Workshop - Video [Last Updated On: February 10th, 2014] [Originally Added On: February 10th, 2014]
- A Competitive Study of Cryptography Techniques over Block Cipher - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- How Quantum Computing Will Change Cryptography [Last Updated On: February 15th, 2014] [Originally Added On: February 15th, 2014]
- REALITY LOST - EXCERPT SIX (QUANTUM CRYPTOGRAPHY) - Video [Last Updated On: February 15th, 2014] [Originally Added On: February 15th, 2014]
- Introduction to Cryptography of Bitcoin, Explained! - Video [Last Updated On: February 18th, 2014] [Originally Added On: February 18th, 2014]
- [FOSDEM 2014] USE OTR or how we learned to start worrying and love cryptography - Video [Last Updated On: February 18th, 2014] [Originally Added On: February 18th, 2014]
- Reshif's Cryptography Challenge Solution/Walkthrough - Video [Last Updated On: February 20th, 2014] [Originally Added On: February 20th, 2014]
- [DEFCON 19] Steganography and Cryptography 101 - Video [Last Updated On: February 22nd, 2014] [Originally Added On: February 22nd, 2014]
- A Brief Rundown Of The Spying Questions Intel's CEO Won't Answer [Last Updated On: February 25th, 2014] [Originally Added On: February 25th, 2014]
- DEF CON 8 - Jon Erickson - Number Theory Complexity, Theory, Cryptography, and Quantum Computing. - Video [Last Updated On: February 26th, 2014] [Originally Added On: February 26th, 2014]
- Was YOUR iPhone at risk of being hacked? Bug in Apple update left mobiles open to identity theft for up to 18 months ... [Last Updated On: February 27th, 2014] [Originally Added On: February 27th, 2014]
- Security researchers urge tech companies to explain their cryptographic choices [Last Updated On: February 27th, 2014] [Originally Added On: February 27th, 2014]
- Apple reveals algorithm behind 'encrypted' iMessages [Last Updated On: February 28th, 2014] [Originally Added On: February 28th, 2014]
- Wiliest Ways to Keep the NSA at Bay [Last Updated On: March 1st, 2014] [Originally Added On: March 1st, 2014]
- How to Pronounce Cryptography - Video [Last Updated On: March 1st, 2014] [Originally Added On: March 1st, 2014]
- cryptography in DNS - Video [Last Updated On: March 3rd, 2014] [Originally Added On: March 3rd, 2014]
- Who is the reclusive billionaire creator of Bitcoin? [Last Updated On: March 4th, 2014] [Originally Added On: March 4th, 2014]
- How to say cryptography in Italian - Video [Last Updated On: March 4th, 2014] [Originally Added On: March 4th, 2014]
- Massive Linux security flaw dwarfs Appleās cryptography problems of just last week [Last Updated On: March 5th, 2014] [Originally Added On: March 5th, 2014]
- Security lessons from RSA [Last Updated On: March 5th, 2014] [Originally Added On: March 5th, 2014]
- Visual Cryptography - Video [Last Updated On: March 5th, 2014] [Originally Added On: March 5th, 2014]
- Classical Computing Embraces Quantum Ideas [Last Updated On: March 6th, 2014] [Originally Added On: March 6th, 2014]
- Quantum Cryptography Conquers Noise Problem [Last Updated On: March 6th, 2014] [Originally Added On: March 6th, 2014]
- REALITY LOST Bonus scene 4. Quantum cryptography Founding Fathers. - Video [Last Updated On: March 7th, 2014] [Originally Added On: March 7th, 2014]
- Quantum Cryptography: From Theory to Practice - Video [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- Forcing Trust: Nonlocal Games and Untrusted-device Cryptography - Video [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- TrustyCon 2014 - New Frontiers in Cryptography - Video [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- REALITY LOST Bonus scene 3. Christian Kurtsiefer on hacking quantum cryptography. - Video [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- Nerlens Noel Tweets Date for Potential NBA Debut [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- CISSP SG Cryptography - Video [Last Updated On: March 10th, 2014] [Originally Added On: March 10th, 2014]
- More secure communications thanks to quantum physics [Last Updated On: March 13th, 2014] [Originally Added On: March 13th, 2014]
- New Cryptography Scheme Secured By Quantum Physics [Last Updated On: March 13th, 2014] [Originally Added On: March 13th, 2014]
- History Of Cryptography - Video [Last Updated On: March 14th, 2014] [Originally Added On: March 14th, 2014]
- avc 19 Cryptography x264 - Video [Last Updated On: March 15th, 2014] [Originally Added On: March 15th, 2014]
- Edward Snowden Speaks at SXSW [Last Updated On: April 10th, 2017] [Originally Added On: March 15th, 2014]
- Tor is building an anonymous instant messenger [Last Updated On: April 10th, 2017] [Originally Added On: March 15th, 2014]
- learn cryptography learn the following pkcs refrences - Video [Last Updated On: March 16th, 2014] [Originally Added On: March 16th, 2014]
- [Lec-2][Part-2] Shift Cipher - Symmetric ciphers - Video [Last Updated On: March 16th, 2014] [Originally Added On: March 16th, 2014]